Affiliation:
1. School of Computer and Electronic Information, Guangxi University, Nanning 530004, China
2. Guangxi Key Laboratory of Digital Infrastructure, Guangxi Information Center, Nanning 530000, China
Abstract
With the enhancement of information volume, people are not satisfied with transmitting only a single secret image at a time but chase to hide multiple secret images in a single picture; however, the large-capacity steganographic scale can easily lead to the degradation of the quality of the image, which attracts the attention of eavesdroppers. In this paper, we propose a Chaotic mapping-enHanced imAge Steganography nEtwork (CHASE), which pioneers to hide colour images in grey images and reduces the difference between the container image and the cover image through the image permutation method, so as to enhance the security of the steganography. The method demonstrates excellent steganalysis resistance in experiments and introduces Generative Adversarial Networks (GANs) to improve the image fidelity in large-capacity steganographic scales. The fusion of chaotic mapping and GAN optimisation enables the steganographic network to simultaneously balance security and image quality. The experimental results show that CHASE can keep the secret image with good invisibility under large-capacity steganographic scales, and at the same time, it can reveal the secret image with high fidelity, and its steganalysis-resistant capability is much better than other state-of-the-art methods.
Funder
Open Project Program of Guangxi Key Laboratory of Digital Infrastructure
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference49 articles.
1. Image steganography: A review of the recent advances;Subramanian;IEEE Access,2021
2. Digital image steganography: Survey and analysis of current methods;Cheddad;Signal Process.,2010
3. Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions;Evstutin;IEEE Access,2020
4. Hiding an image inside another image using variable-rate steganography;Tamimi;Int. J. Adv. Comput. Sci. Appl. (IJACSA),2013
5. Asad, M., Gilani, J., and Khalid, A. (2011, January 11–13). An enhanced least significant bit modification technique for audio steganography. Proceedings of the International Conference on Computer Networks and Information Technology, Abbottabad, Pakistan.